Patents by Inventor C. Scott Chasin
C. Scott Chasin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11263591Abstract: Disclosed is a method and system for managing contacts for a communication system by storing contact information in a centralized storage system and permitting receiving users to access the centralized contact information storage system using a token passed with communications from a sending user. The communications system may be a trusted network with trusted sending and receiving members. Each communications system member provides contact information the member may wish to make available to other parties. The member may also create a policy defining which contact information may be made available to different classes of users. A member of the communications system generates a message to send to a receiving user. A token that identifies the sending user to the communications system is embedded into the message to be sent to the receiving user.Type: GrantFiled: June 7, 2019Date of Patent: March 1, 2022Assignee: McAfee, LLCInventor: C. Scott Chasin
-
Publication number: 20190362316Abstract: Disclosed is a method and system for managing contacts for a communication system by storing contact information in a centralized storage system and permitting receiving users to access the centralized contact information storage system using a token passed with communications from a sending user. The communications system may be a trusted network with trusted sending and receiving members. Each communications system member provides contact information the member may wish to make available to other parties. The member may also create a policy defining which contact information may be made available to different classes of users. A member of the communications system generates a message to send to a receiving user. A token that identifies the sending user to the communications system is embedded into the message to be sent to the receiving user.Type: ApplicationFiled: June 7, 2019Publication date: November 28, 2019Applicant: McAfee, LLCInventor: C. Scott Chasin
-
Patent number: 10354229Abstract: Disclosed is a method and system for managing contacts for a communication system by storing contact information in a centralized storage system and permitting receiving users to access the centralized contact information storage system using a token passed with communications from a sending user. The communications system may be a trusted network with trusted sending and receiving members. Each communications system member provides contact information the member may wish to make available to other parties. The member may also create a policy defining which contact information may be made available to different classes of users. A member of the communications system generates a message to send to a receiving user. A token that identifies the sending user to the communications system is embedded into the message to be sent to the receiving user.Type: GrantFiled: August 4, 2008Date of Patent: July 16, 2019Assignee: McAfee, LLCInventor: C. Scott Chasin
-
Patent number: 10212188Abstract: A system includes a processing node configured to send authorized inbound messages to registered enterprise networks. An authorized message is a message that includes trusted source indicia. Trusted source indicia indicates that the message was sent by one or more of the processing node or an authenticated message transfer node associated with one of the registered enterprise networks. The system may further include an administration node configured to maintain registration of a plurality of message transfer nodes associated with the enterprise networks. A method includes receiving outbound messages from an authenticated message transfer node of an enterprise network, screening the messages for threats to determine whether to send the messages to associated recipients, applying a first message identifier to each message, wherein the first message identifier can be used to track the message and, for each message, sending the message to the associated recipient if no threats are detected in the message.Type: GrantFiled: August 19, 2015Date of Patent: February 19, 2019Assignee: McAfee, LLCInventors: C. Scott Chasin, Wei Lin
-
Patent number: 9560064Abstract: Systems and methods are provided for allowing subscriber message sending profiles to be maintained and used in conjunction with behavior-based anomaly detection techniques and traditional content-based spam signature filtering to enable application of appropriate message disposition policies to outbound subscriber message traffic. According to one embodiment, subscriber profiles are constructed for multiple subscriber accounts associated with a service provider based on outbound message flow originated from the subscriber accounts. Then, possible subscriber account misuse may be discovered by performing behavior-based anomaly detection, including a comparison of a subscriber profile associated with the subscriber account with recent subscriber account usage information, to identify one or more behavioral anomalies in outbound message flow originated from a subscriber account, the behavior-based anomaly detection.Type: GrantFiled: November 30, 2015Date of Patent: January 31, 2017Assignee: McAfee, Inc.Inventors: C. Scott Chasin, Wei Lin, Paul Kincaid-Smith
-
Patent number: 9369415Abstract: Systems and methods for marking electronic messages to indicate human origination are provided. According to one embodiment, an electronic message and information verifying the electronic message is human originated are received. Then, the fact that the electronic message is human originated is conveyed to one or more recipients of the electronic message by associating with the electronic message a human origination indication.Type: GrantFiled: January 30, 2015Date of Patent: June 14, 2016Assignee: McAfee, Inc.Inventor: C. Scott Chasin
-
Publication number: 20160156654Abstract: Systems and methods are provided for allowing subscriber message sending profiles to be maintained and used in conjunction with behavior-based anomaly detection techniques and traditional content-based spam signature filtering to enable application of appropriate message disposition policies to outbound subscriber message traffic. According to one embodiment, subscriber profiles are constructed for multiple subscriber accounts associated with a service provider based on outbound message flow originated from the subscriber accounts. Then, possible subscriber account misuse may be discovered by performing behavior-based anomaly detection, including a comparison of a subscriber profile associated with the subscriber account with recent subscriber account usage information, to identify one or more behavioral anomalies in outbound message flow originated from a subscriber account, the behavior-based anomaly detection.Type: ApplicationFiled: November 30, 2015Publication date: June 2, 2016Inventors: C. Scott Chasin, Wei Lin, Paul Kincaid-Smith
-
Publication number: 20150358352Abstract: A system includes a processing node configured to send authorized inbound messages to registered enterprise networks. An authorized message is a message that includes trusted source indicia. Trusted source indicia indicates that the message was sent by one or more of the processing node or an authenticated message transfer node associated with one of the registered enterprise networks. The system may further include an administration node configured to maintain registration of a plurality of message transfer nodes associated with the enterprise networks. A method includes receiving outbound messages from an authenticated message transfer node of an enterprise network, screening the messages for threats to determine whether to send the messages to associated recipients, applying a first message identifier to each message, wherein the first message identifier can be used to track the message and, for each message, sending the message to the associated recipient if no threats are detected in the message.Type: ApplicationFiled: August 19, 2015Publication date: December 10, 2015Inventors: C. Scott Chasin, Wei Lin
-
Patent number: 9210111Abstract: Systems and methods are provided for allowing subscriber message sending profiles to be maintained and used in conjunction with behavior-based anomaly detection techniques and traditional content-based spam signature filtering to enable application of appropriate message disposition policies to outbound subscriber message traffic. According to one embodiment, subscriber profiles are constructed for multiple subscriber accounts associated with a service provider based on outbound message flow originated from the subscriber accounts. Then, possible subscriber account misuse may be discovered by performing behavior-based anomaly detection, including a comparison of a subscriber profile associated with the subscriber account with recent subscriber account usage information, to identify one or more behavioral anomalies in outbound message flow originated from a subscriber account, the behavior-based anomaly detection.Type: GrantFiled: December 25, 2012Date of Patent: December 8, 2015Assignee: McAfee, Inc.Inventors: C. Scott Chasin, Wei Lin, Paul Kincaid-Smith
-
Patent number: 9160755Abstract: A system includes a processing node configured to send authorized inbound messages to registered enterprise networks. An authorized message is a message that includes trusted source indicia. Trusted source indicia indicates that the message was sent by one or more of the processing node or an authenticated message transfer node associated with one of the registered enterprise networks. The system may further include an administration node configured to maintain registration of a plurality of message transfer nodes associated with the enterprise networks. A method includes receiving outbound messages from an authenticated message transfer node of an enterprise network, screening the messages for threats to determine whether to send the messages to associated recipients, applying a first message identifier to each message, wherein the first message identifier can be used to track the message and, for each message, sending the message to the associated recipient if no threats are detected in the message.Type: GrantFiled: August 17, 2006Date of Patent: October 13, 2015Assignee: McAfee, Inc.Inventors: C. Scott Chasin, Wei Lin
-
Publication number: 20150142905Abstract: Systems and methods for marking electronic messages to indicate human origination are provided. According to one embodiment, an electronic message and information verifying the electronic message is human originated are received. Then, the fact that the electronic message is human originated is conveyed to one or more recipients of the electronic message by associating with the electronic message a human origination indication.Type: ApplicationFiled: January 30, 2015Publication date: May 21, 2015Inventor: C. Scott Chasin
-
Patent number: 9015472Abstract: Systems and methods for marking electronic messages to indicate human origination are provided. According to one embodiment, an electronic message and information verifying the electronic message is human originated are received. Then, the fact that the electronic message is human originated is conveyed to one or more recipients of the electronic message by associating with the electronic message a human origination indication.Type: GrantFiled: March 10, 2006Date of Patent: April 21, 2015Assignee: McAfee, Inc.Inventor: C. Scott Chasin
-
Patent number: 8738708Abstract: An embodiment of a method handles bounced messages in a private network processing hub that is configured to handle messages submitted by a plurality of member networks that are registered with the private network processing hub, and wherein the private network processing hub and the plurality of member networks form a private network. The method may include receiving a first message from a member network or from an unregistered network within the private network processing hub, and determining whether the first message is a bounced message generated in response to an original message sent by the private network processing hub by searching the first message for a tracking identifier that was generated by the private network processing hub and inserted into the original message. The determining operation may include searching for the tracking identifier among a plurality of stored tracking identifiers. A system is described that carries out the method.Type: GrantFiled: September 29, 2006Date of Patent: May 27, 2014Assignee: McAfee, Inc.Inventor: C. Scott Chasin
-
Publication number: 20130326622Abstract: A system includes a processing node configured to send authorized inbound messages to registered enterprise networks. An authorized message is a message that includes trusted source indicia. Trusted source indicia indicates that the message was sent by one or more of the processing node or an authenticated message transfer node associated with one of the registered enterprise networks. The system may further include an administration node configured to maintain registration of a plurality of message transfer nodes associated with the enterprise networks. A method includes receiving outbound messages from an authenticated message transfer node of an enterprise network, screening the messages for threats to determine whether to send the messages to associated recipients, applying a first message identifier to each message, wherein the first message identifier can be used to track the message and, for each message, sending the message to the associated recipient if no threats are detected in the message.Type: ApplicationFiled: August 17, 2006Publication date: December 5, 2013Applicant: MXTN, INC.Inventors: C. Scott Chasin, Wei Lin
-
Patent number: 8484295Abstract: Systems and methods are provided for allowing subscriber message sending profiles to be maintained and used in conjunction with behavior-based anomaly detection techniques and traditional content-based spam signature filtering to enable application of appropriate message disposition policies to outbound subscriber message traffic. According to one embodiment, subscriber profiles are constructed for multiple subscriber accounts associated with a service provider based on outbound message flow originated from the subscriber accounts. Then, possible subscriber account misuse may be discovered by performing behavior-based anomaly detection, including a comparison of a subscriber profile associated with the subscriber account with recent subscriber account usage information, to identify one or more behavioral anomalies in outbound message flow originated from a subscriber account, the behavior-based anomaly detection.Type: GrantFiled: December 21, 2005Date of Patent: July 9, 2013Assignee: McAfee, Inc.Inventors: C. Scott Chasin, Wei Lin, Paul Kincaid-Smith
-
Publication number: 20130117397Abstract: Systems and methods are provided for allowing subscriber message sending profiles to be maintained and used in conjunction with behavior-based anomaly detection techniques and traditional content-based spam signature filtering to enable application of appropriate message disposition policies to outbound subscriber message traffic. According to one embodiment, subscriber profiles are constructed for multiple subscriber accounts associated with a service provider based on outbound message flow originated from the subscriber accounts. Then, possible subscriber account misuse may be discovered by performing behavior-based anomaly detection, including a comparison of a subscriber profile associated with the subscriber account with recent subscriber account usage information, to identify one or more behavioral anomalies in outbound message flow originated from a subscriber account, the behavior-based anomaly detection.Type: ApplicationFiled: December 25, 2012Publication date: May 9, 2013Applicant: MCAFEE INC.Inventors: C. Scott Chasin, Wei Lin, Paul Kincaid-Smith
-
Publication number: 20130041955Abstract: Systems and methods are provided for allowing subscriber message sending profiles to be maintained and used in conjunction with behavior-based anomaly detection techniques and traditional content-based spam signature filtering to enable application of appropriate message disposition policies to outbound subscriber message traffic. According to one embodiment, subscriber profiles are constructed for multiple subscriber accounts associated with a service provider based on outbound message flow originated from the subscriber accounts. Then, possible subscriber account misuse may be discovered by performing behavior-based anomaly detection, including a comparison of a subscriber profile associated with the subscriber account with recent subscriber account usage information, to identify one or more behavioral anomalies in outbound message flow originated from a subscriber account, the behavior-based anomaly detection.Type: ApplicationFiled: December 21, 2005Publication date: February 14, 2013Inventors: C. Scott Chasin, Wei Lin, Paul Kincaid-Smith
-
Patent number: 8363793Abstract: Systems and methods are provided for allowing subscriber message sending profiles to be maintained and used in conjunction with behavior-based anomaly detection techniques and traditional content-based spam signature filtering to enable application of appropriate message disposition policies to outbound subscriber message traffic. According to one embodiment, subscriber profiles are constructed for multiple subscriber accounts associated with a service provider based on outbound message flow originated from the subscriber accounts. Then, possible subscriber account misuse may be discovered by performing behavior-based anomaly detection, including a comparison of a subscriber profile associated with the subscriber account with recent subscriber account usage information, to identify one or more behavioral anomalies in outbound message flow originated from a subscriber account, the behavior-based anomaly detection.Type: GrantFiled: April 20, 2011Date of Patent: January 29, 2013Assignee: McAfee, Inc.Inventors: C. Scott Chasin, Wei Lin, Paul Kincaid-Smith
-
Publication number: 20110197275Abstract: Systems and methods are provided for allowing subscriber message sending profiles to be maintained and used in conjunction with behavior-based anomaly detection techniques and traditional content-based spam signature filtering to enable application of appropriate message disposition policies to outbound subscriber message traffic. According to one embodiment, subscriber profiles are constructed for multiple subscriber accounts associated with a service provider based on outbound message flow originated from the subscriber accounts. Then, possible subscriber account misuse may be discovered by performing behavior-based anomaly detection, including a comparison of a subscriber profile associated with the subscriber account with recent subscriber account usage information, to identify one or more behavioral anomalies in outbound message flow originated from a subscriber account, the behavior-based anomaly detection.Type: ApplicationFiled: April 20, 2011Publication date: August 11, 2011Inventors: C. Scott Chasin, Wei Lin, Paul Kincaid-Smith
-
Patent number: 7953814Abstract: Systems and methods are provided for allowing subscriber message sending profiles to be maintained and used in conjunction with behavior-based anomaly detection techniques and traditional content-based spam signature filtering to enable application of appropriate message disposition policies to outbound subscriber message traffic. According to one embodiment, subscriber profiles are constructed for multiple subscriber accounts associated with a service provider based on outbound message flow originated from the subscriber accounts. Then, possible subscriber account misuse may be discovered by performing behavior-based anomaly detection, including a comparison of a subscriber profile associated with the subscriber account with recent subscriber account usage information, to identify one or more behavioral anomalies in outbound message flow originated from a subscriber account, the behavior-based anomaly detection.Type: GrantFiled: February 28, 2006Date of Patent: May 31, 2011Assignee: McAfee, Inc.Inventors: C. Scott Chasin, Wei Lin, Paul Kincaid-Smith